摘要 :
Key generation from the randomness of wireless channels is a promising technology for the establishment of cryptographic keys between any two users. This paper introduces the wireless key generation technology based on physical la...
展开
Key generation from the randomness of wireless channels is a promising technology for the establishment of cryptographic keys between any two users. This paper introduces the wireless key generation technology based on physical layer. Aiming at the shortcomings of the existing key generation scheme, we have done optimization work in the quantization algorithm and preprocessing. We design an iterative lossless quantization algorithm, which is a multi-round lossless quantization algorithm to make full use of the collected measurements. To enhance the randomness of the generated keys, an adaptive quantization algorithm is designed, which enlarges the quantization intervals in the quantization algorithm. In addition, according to the characteristics of the measurements of static and dynamic scenario, we adopt suitable filtering methods for the respective scenario. At last we concludes with some suggestions for future studies.
收起
摘要 :
For MIMO two-way relay channel, this paper proposes a novel scheme, VBLAST-PNC, to transform the two superimposed packets received by the relay to their network coding form. Different from traditional schemes, which tries to detec...
展开
For MIMO two-way relay channel, this paper proposes a novel scheme, VBLAST-PNC, to transform the two superimposed packets received by the relay to their network coding form. Different from traditional schemes, which tries to detect each packet before network coding them, VBLAST-PNC detects the summation of the two packets before network coding. In particular, after firstly detecting the second layer signal in 2-by-2 MIMO system with VBLAST, we only cancel part of the detected signal, rather than canceling all the components, from the first layer. Then we directly map the obtained signal, which is a weighted summation of the first layer and the second layer, to the network coding form. With such partial interference cancellation, the error propagation effect is significantly mitigated and the performance is thus improved as shown in simulations.
收起
摘要 :
In this paper, a route control method for ad-hoc networks in a multipath fading environment is studied which is based on received power of repeater nodes and the history of established links. When repeater nodes received HELLO Mes...
展开
In this paper, a route control method for ad-hoc networks in a multipath fading environment is studied which is based on received power of repeater nodes and the history of established links. When repeater nodes received HELLO Message, these nodes obtain the received power information from Physical Layer in order to decide whether a link is stable or not. If the received power is lower than a threshold, repeater nodes start route discovery procedure while maintaining the link by referring the history of established link. From the results of computer simulations, it has been clarified that the route discovery time of the proposed method is shortened by about up to 1.8 s, the route effective time is lengthened by about up to 13 s and the average throughput is improved by about up to 50 kbps from the previous proposed method which is an improved method of AODV.
收起
摘要 :
In this paper, a route control method for ad-hoc networks in a multipath fading environment is studied which is based on received power of repeater nodes and the history of established links. When repeater nodes received HELLO Mes...
展开
In this paper, a route control method for ad-hoc networks in a multipath fading environment is studied which is based on received power of repeater nodes and the history of established links. When repeater nodes received HELLO Message, these nodes obtain the received power information from Physical Layer in order to decide whether a link is stable or not. If the received power is lower than a threshold, repeater nodes start route discovery procedure while maintaining the link by referring the history of established link. From the results of computer simulations, it has been clarified that the route discovery time of the proposed method is shortened by about up to 1.8 s, the route effective time is lengthened by about up to 13 s and the average throughput is improved by about up to 50 kbps from the previous proposed method which is an improved method of AODV.
收起
摘要 :
Robustness of communication is essential for many automotive and industrial Ethernet applications due to real-time and safety features that are required. Existing data transmission structures have to be used for higher transmissio...
展开
Robustness of communication is essential for many automotive and industrial Ethernet applications due to real-time and safety features that are required. Existing data transmission structures have to be used for higher transmission rates in some application. Likewise, some new installation require cost-effective cabling with non-ideal transmission characteristics such as unshielded single twisted pair. This enables economic feasibility of Industrial Internet of Things networking of simple sensors and actors. We introduce a universal platform for physical layer analysis for such physical layers. It covers communication channels up to some 10 Mbit/s, which are typically found in industrial and automotive Ethernet. We present a combined soft- and hardware solution. It comprises an end-to-end communication and facilities spectrum, correlation and constellation analysis. Application to and results for unshielded twisted pair cabling are presented.
收起
摘要 :
Robustness of communication is essential for many automotive and industrial Ethernet applications due to real-time and safety features that are required. Existing data transmission structures have to be used for higher transmissio...
展开
Robustness of communication is essential for many automotive and industrial Ethernet applications due to real-time and safety features that are required. Existing data transmission structures have to be used for higher transmission rates in some application. Likewise, some new installation require cost-effective cabling with non-ideal transmission characteristics such as unshielded single twisted pair. This enables economic feasibility of Industrial Internet of Things networking of simple sensors and actors. We introduce a universal platform for physical layer analysis for such physical layers. It covers communication channels up to some 10 Mbit/s, which are typically found in industrial and automotive Ethernet. We present a combined soft- and hardware solution. It comprises an end-to-end communication and facilities spectrum, correlation and constellation analysis. Application to and results for unshielded twisted pair cabling are presented.
收起
摘要 :
Physical layer security is expected to address the security issue in wireless networks by taking advantage of the unique attributes of fading channels. In this paper, we propose a novel physical layer authentication scheme by meas...
展开
Physical layer security is expected to address the security issue in wireless networks by taking advantage of the unique attributes of fading channels. In this paper, we propose a novel physical layer authentication scheme by measuring the locations of surrounding noise sources between communication participants. Typically, the transmitting power of surrounding noise is unknown, so a maximum likelihood (ML) method is adopted to estimate the locations of noise sources, based on the received signal strength (RSS) and angle of arrival (AoA). We analyze the security of the proposed scheme under both passive and active attacks, and show that the proposed scheme can work under highly dynamical scenarios.
收起
摘要 :
Radio frequency (RF) fingerprint has gained wide attention as it takes advantages of inherent characteristics in hardware for identification and verification. However, performance unreliability with long-ago training data and chan...
展开
Radio frequency (RF) fingerprint has gained wide attention as it takes advantages of inherent characteristics in hardware for identification and verification. However, performance unreliability with long-ago training data and channel fading interference are two open problems that restrict the development of RF fingerprint identification. To address the former issue, we propose a long-term stacking of repetitive symbols algorithm to turn the measurement noise toward standard Gaussian distribution, which contributes to both classification accuracy and long-term stability. For the latter issue, we propose an artificial noise adding algorithm in training stage to enhance the identification robustness. At last, we implement a robust RF fingerprint generation and classification scheme for practical device identification. In the experiment, we used 50 CC2530 ZigBee devices to verify the performance of proposed RF identification scheme. Our scheme achieved an accuracy of 100% with both training and testing data measured in the same day, and enabled reliable node recognition with the accuracy over 99% for testing data collected 18 months later. Further exploration shows that the scheme is both robust in additive white Gaussian noise channel and slight non-line-of-sight channel scenarios. The performance in multipath scenarios has also demonstrated the reliability and feasibility of our scheme.
收起
摘要 :
Radio frequency (RF) fingerprint has gained wide attention as it takes advantages of inherent characteristics in hardware for identification and verification. However, performance unreliability with long-ago training data and chan...
展开
Radio frequency (RF) fingerprint has gained wide attention as it takes advantages of inherent characteristics in hardware for identification and verification. However, performance unreliability with long-ago training data and channel fading interference are two open problems that restrict the development of RF fingerprint identification. To address the former issue, we propose a long-term stacking of repetitive symbols algorithm to turn the measurement noise toward standard Gaussian distribution, which contributes to both classification accuracy and long-term stability. For the latter issue, we propose an artificial noise adding algorithm in training stage to enhance the identification robustness. At last, we implement a robust RF fingerprint generation and classification scheme for practical device identification. In the experiment, we used 50 CC2530 ZigBee devices to verify the performance of proposed RF identification scheme. Our scheme achieved an accuracy of 100% with both training and testing data measured in the same day, and enabled reliable node recognition with the accuracy over 99% for testing data collected 18 months later. Further exploration shows that the scheme is both robust in additive white Gaussian noise channel and slight non-line-of-sight channel scenarios. The performance in multipath scenarios has also demonstrated the reliability and feasibility of our scheme.
收起
摘要 :
Universal Serial Bus has supported a wide variety of devices from keyboard, mouse, flash memory, imaging up to high speed broad band devices. In addition, user applications demand a higher performance connection between the PC and...
展开
Universal Serial Bus has supported a wide variety of devices from keyboard, mouse, flash memory, imaging up to high speed broad band devices. In addition, user applications demand a higher performance connection between the PC and other increasingly sophisticated peripherals. USB 3.0 addresses this need by adding even faster transfer rates. It assures a data transfer rate of 4.8 Gbps as compared to its former interface USB 2.0 which has a raw data rate at 480Mbps. This implementation of synthesizable Media Access (MAC) layer of SuperSpeed USB 3.0, with a pipelining concept of processing the packets, is proposed to support high speed transfer rate and high throughputs. Alongside, the use of efficient handshaking signals complies with optimum performance of the overall device. Master controller has also been implemented to command over MAC Layer and other layers that will be implemented in a future research. This implementation meets the required specifications [1].
收起